BSI IT-Grundschutz Building Block Kit
Product Variants
Description
Short Description
The BSI IT-Grundschutz Building Block Kit translates the established building-block logic of IT-Grundschutz into a physical, normatively inspired construction system. Developed for institutions, auditors, and decision-makers who want not only to document information security, but also to make it visible and tangibly structured.
Because compliance holds best when it clicks into place.
Product Description
With the BSI IT-Grundschutz Building Block Kit, abstract information security becomes a tactile experience. Inspired by the modular structure of the IT-Grundschutz Compendium, you build your institution from carefully coordinated security blocks yourself – from basic protection through standard requirements to the optional expansion module for elevated protection needs.
The heart of the system is the ISMS control tower, which serves as the central anchor point for documentation, governance, and contemplative observation. From here, all security measures are not merely managed, but transferred into a consistent overall structure whose stability becomes tangible both technically and organizationally.
Standardized connection points seamlessly couple organization and personnel, concepts and methodology, operations, applications, systems, and detection and response. The resulting structure follows an inner logic that, when applied correctly, presents itself as remarkably self-explanatory and calmly self-contained.
The result is a holistic model of the security architecture that radiates an audit-ready aura of order, responsibility, and structured resilience right there on the conference table. With prolonged observation, users also report increasing clarity regarding responsibilities, interfaces, and implicit dependencies.
Each construction phase is oriented around the logic of real IT-Grundschutz building blocks. Missing processes become immediately visible: without a properly installed ISMS roof, personnel wings and operational segments remain loose, while a hastily mounted cloud-usage module can lead to energetic tension in the overall structure.
In advanced expansion stages, correctly placed blocks develop a certain structural momentum. Dependencies realign, responsibilities solidify, and the overall model tends to stabilize itself – provided that the underlying requirements have been implemented with due care.
Editions
Basic Protection Set
The Basic Protection Set is aimed at institutions with fundamental requirements for structured security thinking. It represents the conceptual entry level and enables the initial construction of an audit-capable model organization.
Includes:
- Basic base plate with normative stud geometry
- ISMS control tower (reduced version)
- Basic wings for Organization and Personnel (ORP) and Operations (OPS)
- Standardized connection elements for initial governance structures
- Minifigure “Information Security Officer”
- Warning sign “Protection needs assessment to follow”
Note: Extended requirements are conceptually anticipated, but not physically included.
Standard Requirements Set
The Standard Requirements Set represents a complete model institution according to established IT-Grundschutz methodology and is suitable for illustrating resilient security architectures as well as symbolic audit preparation.
Includes in addition to the Basic Set:
- Complete representation of all building-block groups (ISMS, ORP, CON, OPS, DER, APP, SYS, IND)
- Extended ISMS control tower with documentation platform
- Application and system modules with audit-capable connection logic
- Situation center for Detection and Response (DER)
- Checklist sticker sheet for visual evidence management
Note: Further special components are required for elevated protection needs.
Expansion Set for Elevated Protection Needs (Executive Edition)
The Executive Edition expands the model with highly complex structures for institutions with increased protection needs and heightened regulatory visibility.
Includes in addition to the Standard Set:
- High-security fence with redundant access-control points
- Redundant data center with synchronized brick architecture
- Crisis management room with increased decision density
- Extended DER situation center with blue-light module
- Special blocks for elevated dependencies and escalation paths
- Minifigure “External Auditor” with movable clipboard
- Certificate display (without legal effect)
Note: The complexity of the model increases exponentially with growing completeness.
Product Highlights
- 27,001 pieces for maximum proximity to normative sensitivities
- 8 themed worlds modeled after real building-block groups
- Standard-requirement bricks in administration-inspired colors
- Expansion logic for increased protection needs
- Modular security architecture with audit-proof connector joints
- Governance structures you can literally experience by touch
- Subtle resonance effects between correctly placed blocks
- Suitable for long-term stabilization of organizational self-perception
Disclaimer
This product is inspired by common IT-Grundschutz methodologies and is intended solely as a symbolic representation of security architectures. Certification or actual compliance effects are not included in the scope of delivery.
3 reviews
Finally, a risk register with gravity
Feb 11, 2025We used to track dependencies in spreadsheets nobody opened. Now the dependencies are physically attached to the table and occasionally injure optimistic project plans. Five stars for making "control effectiveness" audible when a module clicks into place.
- Pat from Risk, probably on muteBoard-ready after only six subcommittees
Mar 4, 2025I brought the Executive Edition to a steering meeting and watched three directors agree on scope without opening PowerPoint. The blue-light module is especially helpful when someone says, “Can’t we just accept the risk?”
- VP of Governance TheatreBetter than another awareness poster
Apr 18, 2025I came for evidence, stayed for the miniature crisis room, and left with a surprising respect for stud-based governance. Minor concern: the certificate display has no legal effect, but frankly neither did half the PDFs I reviewed last quarter.
- External Assessor, coffee-fueled